summaryrefslogtreecommitdiff
blob: c4c8674417f32eeb5148592cf341a88909c96ec2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200712-06">
  <title>Firebird: Multiple buffer overflows</title>
  <synopsis>
    Multiple stack-based buffer overflows were discovered in Firebird.
  </synopsis>
  <product type="ebuild">firebird</product>
  <announced>2007-12-09</announced>
  <revised count="01">2007-12-09</revised>
  <bug>195569</bug>
  <access>remote</access>
  <affected>
    <package name="dev-db/firebird" auto="yes" arch="*">
      <unaffected range="ge">2.0.3.12981.0-r2</unaffected>
      <vulnerable range="lt">2.0.3.12981.0-r2</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Firebird is a multi-platfrom, open source relational database.
    </p>
  </background>
  <description>
    <p>
    Adriano Lima and Ramon de Carvalho Valle reported that functions
    isc_attach_database() and isc_create_database() do not perform proper
    boundary checking when processing their input.
    </p>
  </description>
  <impact type="normal">
    <p>
    A remote attacker could send specially crafted requests to the Firebird
    server on TCP port 3050, possibly resulting in the execution of
    arbitrary code with the privileges of the user running Firebird
    (usually firebird).
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All Firebird users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=dev-db/firebird-2.0.3.12981.0-r2"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4992">CVE-2007-4992</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5246">CVE-2007-5246</uri>
  </references>
  <metadata tag="requester" timestamp="2007-11-28T11:24:49Z">
    rbu
  </metadata>
  <metadata tag="bugReady" timestamp="2007-11-29T00:06:33Z">
    rbu
  </metadata>
  <metadata tag="submitter" timestamp="2007-12-08T23:26:04Z">
    p-y
  </metadata>
</glsa>